rule locdoor_ransomware { meta: description = "Rule to detect Locdoor/DryCry" author = "Marc Rivero | @seifreed" reference = "https://twitter.com/leotpsc/status/1036180615744376832" strings: $s1 = "copy \"Locdoor.exe\" \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\temp00000000.exe\"" fullword ascii $s2 = "copy wscript.vbs C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\wscript.vbs" fullword ascii $s3 = "!! Your computer's important files have been encrypted! Your computer's important files have been encrypted!" fullword ascii $s4 = "echo CreateObject(\"SAPI.SpVoice\").Speak \"Your computer's important files have been encrypted! " fullword ascii $s5 = "! Your computer's important files have been encrypted! " fullword ascii $s7 = "This program is not supported on your operating system." fullword ascii $s8 = "echo Your computer's files have been encrypted to Locdoor Ransomware! To make a recovery go to localbitcoins.com and create a wa" ascii $s9 = "Please enter the password." fullword ascii condition: ( uint16(0) == 0x5a4d and filesize < 600KB ) and all of them }